The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cross domain data such as numerical or categorical types are ubiquitous in practical network. Network anomaly detection based on cluster analysis exist some difficulties, for example, the initial center of cluster analysis is sensitive and easy to fall into the local optimal solution. Cross domain data involved great information, but can't be effectively used, which will influence the performance...
The existing network platform can not meet the new launch vehicle launch costs, and there is the need for high reliability storage and application of massive data. A scheme of measuring and controlling network system based on cloud platform is put forward. The centralized management of system resources is realized. Enhanced resource utilization and system scalability, and reduced the development cost...
Mobile Crowd Sensing Networks (MCSN) treat the ordinary users with their mobile devices as the basic sensing units, and leverage them to distribute complex social sensing tasks and collect sensing data with each other by the mobile networks. To improve the efficiency and the feasibility of data sensing, collection and transmission in MCSN, we propose an opportunistic data transmission mechanism based...
This paper focuses on the design of dimensionality reduction based on Fisherface. We propose to apply the Fisherface algorithm in face recognition to automatic modulation recognition, and combine it with cyclic spectrum and k nearest neighbor classifier to realize the correct recognition of 9 kinds of modulation signals. Fisherface is an improved algorithm based on Fisher linear discriminant analysis,...
This paper presented a method of evaluating the health of lithium battery based on the continuous hidden Markov model (CHMM). This paper focuses on how to use CHMM to build the evaluation model. The capacity of battery is chosen as the observation variable. The evaluation process is divided into two phases: leaning phase and evaluation phase. First, learning data is used to estimate the elements of...
Reliable detection of intrusion is the basis of safety in cognitive radio networks (CRNs). So far, few scholars applied intrusion detection systems (IDSs) to combat intrusion against CRNs. In order to improve the performance of intrusion detection in CRNs, a distributed intrusion detection scheme has been proposed. In this paper, a method base on Dempster-Shafer's (D-S) evidence theory to detect intrusion...
It is known that the features of the radio station vary with the signal to noise ratio (SNR) in a certain range which leads to the uncertainty of the radio station identification system. In this paper, we study the interval evidence recognizer by extending the individual features of the obtained radio from single value to interval and constructing the radio station feature database. Firstly, the range...
Based on actual requirements and safety reliability requirements, this paper presents a design scheme of safety portable voice information recording equipment. There are two main parts in the whole system, one is the voice recording board and the other one is the portable military laptop. The voice recording board uses advanced RISC machines chip as the main chip equipped with real-time operating...
Since the low SNR environment, generally the modulation recognition rate of signal modulation type is not very high. In this paper, we studied an automatic recognition method of communication signal modulation type in the low SNR. According to analyze the signal entropy as the feature, three characteristics are selected, and the random forest is as the classifier, finally we get a high recognition-rate...
In Recent years, sparse representation has been significantly applied in many image processing problems, such as image restoration, face recognition and image super-resolution, and shown promising results. The key issue of sparse representation is how to find a reasonable representation dictionary, through which the image can be presented more sparsely. In this paper, we addressed the biological image...
Cognitive radio (CR) is the enabling technology for supporting dynamic spectrum access. This sort of communication paradigm can utilize increasingly scarce spectrum resources more efficiently and has become one of the the hot issues of wireless communication in recent years. With in-depth research, some unique security risks of the CR network has been revealed. A new method named RF "Distinct...
Automated Modulation Classification (AMC) shows great significance for any receiver that has little knowledge of the modulation scheme of the received signal. A useful digital signal modulation recognition scheme inspired by the deep auto-encoder network is proposed in this investigation. In our proposed method, there are two deep auto-encoder networks. The system extracts the original features of...
Target tracking is an important part of many applications in computer vision. With continuous researching and developing, more and more advanced tracking algorithms have been put forward. Therefore, a benchmark and dataset used to evaluate the most advanced tracking algorithms are needed. One of the most widely used benchmarks is Online Tracking Benchmark (OTB). This benchmark has a clear statement...
The microblog platform treats the 'concern' as the relationship between the accounts, by which the social network of the accounts is built. In this paper, we use the PageRank algorithm to identify zombie microblog accounts. For the microblogs, the directions of the hyperlinks between the pages and the attentions of the social relations can be seen as the directed links in social network. If an account...
We proposed an algorithm using Rényi entropy to distinguish the M-QAM signals in this article. There is no requirement of prior information of the parameters of the signal, because the method we proposed making Wigner-Ville distribution time-frequency transform to signal, then calculate the Rényi entropy, and the last the theory of Dempster-Shafer evidence was used to classify the signals. The results...
This paper introduces a framework for studying resilience of networked systems in the presence of strong network externalities. The framework used in this paper explicitly incorporates costs of connection and the benefits that are received by direct and indirect access to resources. We show that this simple framework is capable of capturing the three key parameters of resilience: Magnitude of Performance...
This position paper proposes CsPI (Cybersecurity Performance Index) as a new way to evaluate the cyber security investment decisions and measure the progresses and effects of the investments and projects. In a conventional way, cyber security budgets are usually evaluated by the return on investment (ROI), which has some undesirable side effects. Since we don't ask for return on investment for other...
U.S. Department of Defense regulations intended to improve cybersecurity within the Defense Industrial Base may cause degradation of critical defense infrastructure. Four impediments to 'clean' compliance, environmental and internal, are detailed. Inability to functionally comply, or to correctly insure, will impact the DIB's cybersecurity decision-making at the enterprise level. Economic impact to...
Workflow management system (WfMS) should be capable of self-autonomous non-function attributes to experience its resilience to the change of runtime environment in Business Process Management (BPM) domain. With the motivation mentioned above, we propose the resilience mechanism for WfMS, associating with the corresponding methods proposed in our early research work, engaging to achieve our final aim,...
Software, in many different fields and tasks, hasplayed a critical role and even replaced humans to improveefficiency and safety. However, catastrophic consequences can becaused by implementation bugs and design defects. Modifiedcondition/decision coverage (MC/DC), required by the FederalAviation Administration on Level A (the most safety criticalsystem), has been shown to be effective in detecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.